Ransomware Grows More Targeted

Attackers continue to refine malware attacks, including refining the code that locks victims' PCs or mobile devices, encrypts all of the data stored on the devices, and then demands a ransom payment to receive an unlock code, says Raj Samani, vice president and CTO for Europe, the Middle East and Africa at Intel Security.

Ransomware remains a lucrative business model for many cybercriminals, in part because related attacks are easy to automate and scale, Samani says.

In this video interview at RSA Conference 2016, Samani, who's also a cybersecurity adviser to Europol - the EU's law enforcement intelligence agency - discusses:

The impetus for online criminals to plow illicit profits into research and development efforts designed to evade security defenses;

Why criminals are increasingly turning to remote, virtual crimes.

In addition to his role at Intel Security, Samani is a member of the Advisory Group on Internet Security for the Europol Cybercrime Centre, or EC3, as well as the chief innovation officer for Cloud Security Alliance. He previously worked as a security consultant for CapGemini and as an information security manager for consultancy Deloitte.

About the Author

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.

Operation Success!

Risk Management Framework: Learn from NIST

From heightened risks to increased regulations, senior leaders at all levels are pressured to
improve their organizations' risk management capabilities. But no one is showing them how -
until now.

Learn the fundamentals of developing a risk management program from the man who wrote the book
on the topic: Ron Ross, computer scientist for the National Institute of Standards and
Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37
- the bible of risk assessment and management - will share his unique insights on how to:

Understand the current cyber threats to all public and private sector organizations;

Develop a multi-tiered risk management approach built upon governance, processes and
information systems;

Enter your email address to reset your password

Already have anISMG account?

Forgot Your Password Message:

Contact Us

Already have anISMG account?

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.